Example of ED-247 standard implementation
☆32Sep 26, 2024Updated last year
Alternatives and similar repositories for ED247_LIBRARY
Users that are interested in ED247_LIBRARY are comparing it to the libraries listed below
Sorting:
- This Is Indian Country - Spring 2018 Instance☆12Apr 30, 2018Updated 7 years ago
- A Pretty Printer, based on Philip Wadler's "A prettier printer". But heavily modified to be efficient in a strict language.☆19Mar 20, 2021Updated 5 years ago
- A tool for the automatic generation of Isabelle/HOL correctness proofs for security protocols.☆18Jun 21, 2015Updated 10 years ago
- Dynamic UI Scaling Toolkit for LabVIEW☆25Jan 7, 2021Updated 5 years ago
- A collection of classes for use in de-com of Pcap files and the resulting iNet-X and IENA packets, Applies to both pcap files and straigh…☆19Feb 11, 2026Updated last month
- Minimal SML-based web server☆14Jun 19, 2015Updated 10 years ago
- MediaMongrels Ltd LabVIEW WebSockets API on the NI Tools Network☆33Aug 7, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- This package includes many data files for SCIM Generic Table Input Method module (table).☆15Aug 3, 2024Updated last year
- ☆12Feb 24, 2023Updated 3 years ago
- An Unofficial LSE LaTeX Beamer Theme☆15Sep 1, 2015Updated 10 years ago
- Indicator for character copying☆22Jan 25, 2022Updated 4 years ago
- company-mode completion back-end for MLton/Standard ML☆16Dec 7, 2020Updated 5 years ago
- RasPiCamcorder3 the PiTFT version☆22Mar 31, 2014Updated 11 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Ocaml library to control Firmata boards like Arduino☆20Oct 24, 2016Updated 9 years ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- ☆11May 2, 2022Updated 3 years ago
- ☆22May 19, 2016Updated 9 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- ☆12Jun 6, 2025Updated 9 months ago
- Pirate Trading Platform: Open source automated trading based on algorithmic market evaluation☆13Sep 25, 2017Updated 8 years ago
- Simulations work for the Underactuated Lightweight Tensegrity Robotic Assistive Spine. This repository includes code for the kinematics, …☆12Jan 11, 2019Updated 7 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Tutorial for using the MPL compiler for Parallel ML☆23Jan 10, 2025Updated last year
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Excelsior JET Gradle Plugin provides Gradle users with an easy way to compile their applications down to optimized native Windows, OS X, …☆26Jun 13, 2019Updated 6 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- Summarize CTI reports with OpenAI☆18Mar 9, 2026Updated last week
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- Scripts to compile and run Standard ML programs defined in .mlb files.☆17Mar 3, 2025Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- ☆12Aug 18, 2020Updated 5 years ago